Cryptology ePrint Archive: Listing for 2003
-
2003/265 ( PDF )
- Concurrent/Resettable Zero-Knowledge With Concurrent Soundness in the Bare Public-Key Model and Its Applications
- Yunlei ZHAO
-
2003/264 ( PS PS.GZ )
- Inversion of Several Field Elements: A New Parallel Algorithm
- Pradeep Kumar Mishra and Palash Sarkar
-
2003/263 ( PS PS.GZ PDF )
- Security Analysis of Lal and Awasthi's Proxy Signature Schemes
- Manik Lal Das and Ashutosh Saxena and V P Gulati
-
2003/262 ( PS PS.GZ PDF )
- A Secure Modified ID-Based Undeniable Signature Scheme
- Sherman S.M. Chow and Lucas C.K. Hui and S.M. Yiu and K.P. Chow
-
2003/261 ( PS PS.GZ PDF )
- A provably secure ID-based ring signature scheme
- Javier Herranz and Germ\'an S\'aez
-
2003/260 ( PDF )
- An Improved ID-based Authenticated Group Key Agreement Scheme
- Xinjun Du, Ying Wang, Jianhua Ge, Yumin Wang
-
2003/259 ( PS PS.GZ PDF )
- Attack on Two ID-based Authenticated Group Key Agreement Schemes
- Fangguo Zhang and Xiaofeng Chen
-
2003/258 ( PDF )
- Analysis of Implementation Hierocrypt-3 algorithm (and its comparison to Camellia algorithm) using ALTERA devices.
- Marcin Rogawski
-
2003/257 ( PDF )
- Trading Inversions for Multiplications in Elliptic Curve Cryptography
- Mathieu Ciet and Marc Joye and Kristin Lauter and Peter L. Montgomery
-
2003/256 ( -- withdrawn -- )
- On the Security of a Multi-Party Certified Email Protocol
- Jianying Zhou
-
2003/255 ( PS PS.GZ PDF )
- Improved Constructions for Universal Re-encryption.
- Peter Fairbrother
-
2003/254 ( PDF )
- Committing Encryption and Publicly-Verifiable SignCryption
- Yitchak Gertner and Amir Herzberg
-
2003/253 ( PDF )
- Aspects of Hyperelliptic Curves over Large Prime Fields in Software Implementations
- Roberto Maria Avanzi
-
2003/252 ( PS PS.GZ PDF )
- On Simulation-Sound Trapdoor Commitments
- Philip MacKenzie and Ke Yang
-
2003/251 ( PDF )
- Isomorphism Classes of Hyperelliptic Curves of genus 3 over finite fields
- EunKyung Jeong
-
2003/250 ( PS PS.GZ PDF )
- Breaking the Stream Cipher Whitenoise
- Hongjun Wu
-
2003/249 ( PS PS.GZ PDF )
- Software Specifications For Tinnitus Utilizing Whitenoise(Revised Feb 2004)
- Stephen Boren and Andre Brisson
-
2003/248 ( PS PS.GZ PDF )
- Efficient Implementation of Genus Three Hyperelliptic Curve Cryptography over GF(2^n)
- Izuru Kitamura and Masanobu Katagi
-
2003/247 ( PDF )
- ID-based Authenticated Two Round Multi-Party Key Agreement
- Xinjun Du and Ying Wang and Jianhua Ge and Yumin Wang
-
2003/246 ( PS PS.GZ PDF )
- Quantum Digital Signature Based on Quantum One-way Functions
- Xin L¨¹ and Deng-Guo Feng
-
2003/245 ( PS PS.GZ PDF )
- A Key Substitution Attack on SFLASH^{v3}
- Willi Geiselmann and Rainer Steinwandt
-
2003/244 ( PS PS.GZ PDF )
- Efficient Public Key Steganography Secure Against Adaptively Chosen Stegotext Attacks
- Tri Van Le and Kaoru Kurosawa
-
2003/243 ( PS PS.GZ PDF )
- An Attack on Not-interactive Designated Verifier Proofs for Undeniable Signatures
- Guilin Wang
-
2003/242 ( PDF )
- Improved Weil and Tate pairings for elliptic and hyperelliptic curves
- Kirsten Eisentraeger and Kristin Lauter and Peter L. Montgomery
-
2003/241 ( PS PS.GZ PDF )
- Hybrid Broadcast Encryption and Security Analysis
- Shaoquan Jiang ang Guang Gong
-
2003/240 ( PS PS.GZ PDF )
- How to Break and Repair a Universally Composable Signature Functionality
- Michael Backes and Dennis Hofheinz
-
2003/239 ( PS PS.GZ PDF )
- Universally Composable Signatures, Certification and Authentication
- Ran Canetti
-
2003/238 ( PDF )
- Chameleon Signature from Bilinear Pairing
- Xinjun Du and Ying Wang and Jianhua Ge and Yumin Wang
-
2003/237 ( PS PS.GZ PDF )
- Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity
- Benoit Chevallier-Mames and Mathieu Ciet and Marc Joye
-
2003/236 ( PDF )
- Combinational Logic Design for AES SubByte Transformation on Masked Data
- Elena Trichina
-
2003/235 ( PS PS.GZ PDF )
- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
- Yevgeniy Dodis and Rafail Ostrovsky and Leonid Reyzin and Adam Smith
-
2003/234 ( PS PS.GZ )
- Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary
- Gene Itkis and Peng Xie
-
2003/233 ( PS PS.GZ PDF )
- Public Key Steganography
- Luis von Ahn and Nicholas J. Hopper
-
2003/232 ( PS PS.GZ PDF )
- The Statistical Zero-knowledge Proof for Blum Integer Based on Discrete Logarithm
- Chunming Tang and Zhuojun Liu and Jinwang Liu
-
2003/231 ( PS PS.GZ PDF )
- Public-Key Steganography with Active Attacks
- Michael Backes and Christian Cachin
-
2003/230 ( PS PS.GZ PDF )
- A Fast Provably Secure Cryptographic Hash Function
- Daniel Augot and Matthieu Finiasz and Nicolas Sendrier
-
2003/229 ( PS PS.GZ PDF )
- Algebraic Attacks on Summation Generators
- Dong Hoon Lee and Jaeheon Kim and Jin Hong and Jae Woo Han and Dukjae Moon
-
2003/228 ( PDF )
- Verifiably Committed Signatures Provably Secure in The Standard Complexity Model
- Huafei Zhu
-
2003/227 ( PS PS.GZ PDF )
- Attacks on a Secure Group Communication Scheme With Hierarchical Access Control
- Willi Geiselmann and Rainer Steinwandt
-
2003/226 ( PS PS.GZ PDF )
- On the Security of a Group Signature Scheme with Forward Security
- Guilin Wang
-
2003/225 ( PS PS.GZ )
- Masking Based Domain Extenders for UOWHFs: Bounds and Constructions
- Palash Sarkar
-
2003/224 ( -- withdrawn -- )
-
-
-
2003/223 ( PS PS.GZ PDF )
- Cryptanalysis of a Cryptosystem based on Drinfeld modules
- Simon R. Blackburn, Carlos Cid and Steven D. Galbraith
-
2003/222 ( PS PS.GZ PDF )
- A Verifiable Secret Sharing Scheme with Statistical zero-knowledge
- Chunming Tang and Zhuojun Liu and Mingsheng Wang
-
2003/221 ( PS PS.GZ PDF )
- A Cryptanalysis of the Original Domingo-Ferrer's Algebraic Privacy Homomophism
- Jung Hee Cheon and Hyun Soo Nam
-
2003/220 ( PS PS.GZ PDF )
- A short comment on the affine parts of SFLASH^{v3}
- Willi Geiselmann and Rainer Steinwandt
-
2003/219 ( PS PS.GZ PDF )
- Cryptanalysis of the Repaired Public-key Encryption Scheme Based on the Polynomial Reconstruction Problem
- Jean-Sebastien Coron
-
2003/218 ( PDF )
- A Security Evaluation of Whitenoise
- David Wagner
-
2003/217 ( PS PS.GZ PDF )
- Chemical Combinatorial Attacks on Keyboards
- Eric Brier and David Naccache and Pascal Paillier
-
2003/216 ( PS PS.GZ PDF )
- Secure Indexes
- Eu-Jin Goh
-
2003/215 ( PDF )
- Divide and Concatenate: A Scalable Hardware Architecture for Universal MAC
- Bo Yang and Ramesh Karri and David Mcgrew
-
2003/214 ( PS PS.GZ )
- Multi-Trapdoor Commitments and their Applications to Non-Malleable Protocols
- Rosario Gennaro
-
2003/213 ( PS PS.GZ PDF )
- Isomorphism Classes of Hyperelliptic Curves of Genus 2 over $\mathbb{F}_{2^n}$
- Y.Choie and E.Jeong
-
2003/212 ( PS PS.GZ PDF )
- High Performance Arithmetic for Hyperelliptic Curve Cryptosystems of Genus Two
- Jan Pelzl and Thomas Wollinger and Christof Paar
-
2003/211 ( PS PS.GZ PDF )
- SFLASHv3, a fast asymmetric signature scheme
- Nicolas T. Courtois, Louis Goubin and Jacques Patarin
-
2003/210 ( PS PS.GZ PDF )
- On a Relation Between Verifiable Secret Sharing Schemes and a Class of Error-Correcting Codes
- Ventzislav Nikov and Svetla Nikova
-
2003/209 ( PS PS.GZ PDF )
- Using the Trace Operator to repair the Polynomial Reconstruction based Cryptosystem presented at Eurocrypt 2003
- Daniel Augot and Matthieu Finiasz and Pierre Loidreau
-
2003/208 ( PS PS.GZ PDF )
- ID-Based Chameleon Hashes from Bilinear Pairings
- Fangguo Zhang and Reihaneh Safavi-Naini and Willy Susilo
-
2003/207 ( PS PS.GZ PDF )
- Security Flaws in Several Group Signatures Proposed by Popescu
- Guilin Wang, and Sihan Qing
-
2003/206 ( PS PS.GZ PDF )
- Identity Based Undeniable Signatures
- Benoît Libert and Jean-Jacques Quisquater
-
2003/205 ( PS PS.GZ PDF )
- Improved Cryptanalysis of SecurID
- Scott Contini and Yiqun Lisa Yin
-
2003/204 ( PDF )
- A Composition Construction of Bent-Like Boolean Functions from Quadratic Polynomials
- ZENG Xiangyong and HU Lei
-
2003/203 ( PS PS.GZ PDF )
- Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems using Degenerate Divisors
- Masanobu Katagi and Izuru Kitamura and Toru Akishita and Tsuyoshi Takagi
-
2003/202 ( PS PS.GZ PDF )
- Yet Another Sieving Device
- Willi Geiselmann and Rainer Steinwandt
-
2003/201 ( PDF )
- an attack on a multisignature scheme
- Zheng dong & KF.chen
-
2003/200 ( PDF )
- Cryptanalysis of B.Lee-S.Kim-K.Kim Proxy Signature
- Zheng Dong , Shengli Liu & kefei Chen
-
2003/199 ( PS PS.GZ PDF )
- Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan
- Simon R. Blackburn and Kenneth G. Paterson
-
2003/198 ( PS PS.GZ PDF )
- Construction of Perfect Nonlinear and Maximally Nonlinear Multi-Output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria
- Kishan Chand Gupta and Palash Sarkar
-
2003/197 ( PS PS.GZ PDF )
- Revisiting fully distributed proxy signature schemes
- Javier Herranz and German Saez
-
2003/196 ( PS PS.GZ PDF )
- Security Analysis of Some Proxy Signatures
- Guilin Wang, Feng Bao, Jianying Zhou, and Robert H. Deng
-
2003/195 ( PDF )
- Public Key Encryption with keyword Search
- Dan Boneh and Giovanni Di Crescenzo and Rafail Ostrovsky and Giuseppe Persiano
-
2003/194 ( PS PS.GZ PDF )
- Security Analysis of Several Group Signature Schemes
- Guilin Wang
-
2003/193 ( PS PS.GZ PDF )
- Efficient Extension of Standard Schnorr/RSA signatures into Universal Designated-Verifier Signatures
- Ron Steinfeld and Huaxiong Wang and Josef Pieprzyk
-
2003/192 ( PS PS.GZ PDF )
- Universal Designated-Verifier Signatures
- Ron Steinfeld and Laurence Bull and Huaxiong Wang and Josef Pieprzyk
-
2003/191 ( PS PS.GZ )
- Projective Coordinates Leak
- David Naccache and Nigel Smart and Jacques Stern
-
2003/190 ( -- withdrawn -- )
- Extending Joux's Protocol to Multi Party Key Agreement
- Rana Barua and Ratna Dutta and Palash Sarkar
-
2003/189 ( PDF )
- Cryptanalysis of publicly verifiable authenticated encryption
- Zuhua Shao
-
2003/188 ( PDF )
- A New Forward Secure Signature Scheme using Bilinear Maps
- Fei Hu and Chwan-Hwa Wu and J. D. Irwin
-
2003/187 ( PS PS.GZ PDF )
- Resource Bounded Unprovability of Computational Lower Bounds
- Tatsuaki Okamoto and Ryo Kashima
-
2003/186 ( PS PS.GZ PDF )
- Safe Prime Generation with a Combined Sieve
- Michael J. Wiener
-
2003/185 ( PS PS.GZ PDF )
- VMPC Stream Cipher
- Bartosz Zoltak
-
2003/184 ( PS PS.GZ PDF )
- What do DES S-boxes Say to Each Other ?
- Nicolas T. Courtois and Guilhem Castagnos and Louis Goubin
-
2003/183 ( PDF )
- Certificate-Based Encryption and the Certificate Revocation Problem
- Craig Gentry
-
2003/182 ( PS PS.GZ PDF )
- Chosen-Ciphertext Security from Identity-Based Encryption
- Ran Canetti, Shai Halevi, and Jonathan Katz
-
2003/181 ( PS PS.GZ PDF )
- On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
- Rui Zhang and Goichiro Hanaoka and Junji Shikata and Hideki Imai
-
2003/180 ( PS PS.GZ )
- Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves
- Pradeep Kumar Mishra and Palash Sarkar
-
2003/179 ( PS PS.GZ PDF )
- VMPC One-Way Function
- Bartosz Zoltak
-
2003/178 ( PDF )
- Constructing Optimistic Fair Exchange Protocols from Committed Signatures
- Huafei Zhu
-
2003/177 ( PS PS.GZ PDF )
- Building Secure Cryptographic Transforms, or How to Encrypt and MAC
- Tadayoshi Kohno and Adriana Palacio and John Black
-
2003/176 ( PS PS.GZ PDF )
- Patterson-Wiedemann Construction Revisited
- S. Gangopadhyay and P. H. Keskar and S. Maitra
-
2003/175 ( PS PS.GZ PDF )
- Double-Speed Safe Prime Generation
- David Naccache
-
2003/174 ( PS PS.GZ PDF )
- Relaxing Chosen-Ciphertext Security
- Ran Canetti and Hugo Krawczyk and Jesper Nielsen
-
2003/173 ( PS PS.GZ PDF )
- Domain Extender for Collision Resistant Hash Functions: Improving Upon Merkle-Damgaard Iteration
- Palash Sarkar
-
2003/172 ( PS PS.GZ PDF )
- NAEP: Provable Security in the Presence of Decryption Failures
- Nick Howgrave-Graham and Joseph H. Silverman and Ari Singer and William Whyte
-
2003/171 ( PS PS.GZ PDF )
- Scalable Protocols for Authenticated Group Key Exchange
- Jonathan Katz and Moti Yung
-
2003/170 ( PS PS.GZ PDF )
- HARPS: HAshed Random Preloaded Subset Key Distribution
- Mahalingam Ramkumar and Nasir Memon
-
2003/169 ( PS PS.GZ PDF )
- Properties of the Transformation Semigroup of the Solitaire Stream Cipher
- Boris Pogorelov and Marina Pudovkina
-
2003/168 ( PS PS.GZ )
- Robust discretization, with an application to graphical passwords
- Jean-Camille Birget and Dawei Hong and Nasir Memon
-
2003/167 ( PDF )
- Identity-based Chameleon Hash and Applications
- Giuseppe Ateniese and Breno de Medeiros
-
2003/166 ( PS PS.GZ PDF )
- A reduction of the space for the parallelized Pollard lambda search on elliptic curves over prime finite fields and on anomalous binary elliptic curves
- Igor Semaev
-
2003/165 ( PDF )
- Commitment Capacity of Discrete Memoryless Channels
- Andreas Winter, Anderson C. A. Nascimento, Hideki Imai
-
2003/164 ( PS PS.GZ PDF )
- Identity-Based Threshold Decryption
- Joonsang Baek and Yuliang Zheng
-
2003/163 ( PS PS.GZ PDF )
- Multipurpose Identity-Based Signcryption : A Swiss Army Knife for Identity-Based Cryptography
- Xavier Boyen
-
2003/162 ( PS PS.GZ PDF )
- Cryptanalysis of the Alleged SecurID Hash Function
- Alex Biryukov and Joseph Lano and Bart Preneel
-
2003/161 ( PS PS.GZ PDF )
- Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology
- Ueli Maurer and Renato Renner and Clemens Holenstein
-
2003/160 ( PS PS.GZ PDF )
- A More Secure and Efficacious TTS Signature Scheme
- Jiun-Ming Chen and Bo-Yin Yang
-
2003/159 ( PS PS.GZ PDF )
- An efficient variant of the RSA cryptosystem
- Cesar Alison Monteiro Paixão
-
2003/158 ( PS PS.GZ )
- A Sufficient Condition and Optimal Domain Extension of UOWHF
- Mridul Nandi
-
2003/157 ( PS PS.GZ )
- Some RSA-based Encryption Schemes with Tight Security Reduction
- Kaoru Kurosawa and Tsuyoshi Takagi
-
2003/156 ( PS PS.GZ PDF )
- Efficient Provably Secure Public Key Steganography
- Tri Van Le
-
2003/155 ( PDF )
- A Formal Proof of Zhu's Signature Scheme
- huafei zhu
-
2003/154 ( PS PS.GZ )
- ManTiCore: Encryption with Joint Cipher-State Authentication
- Cheryl Beaver and Timothy Draelos and Richard Schroeppel and Mark Torgerson
-
2003/153 ( PDF )
- Attack on an Identification Scheme Based on Gap Diffie-Hellman Problem
- Zhen-Feng ZHANG and Jing XU and Deng-Guo FENG
-
2003/152 ( PDF )
- Optimal Statistical Power Analysis
- Eric Brier and Christophe Clavier and Francis Olivier
-
2003/151 ( PDF )
- Secret sharing schemes on sparse homogeneous access structures with rank three
- Jaume Martí-Farré and Carles Padró
-
2003/150 ( PS PS.GZ PDF )
- On the random-oracle methodology as applied to length-restricted signature schemes
- Ran Canetti and Oded Goldreich and Shai Halevi
-
2003/149 ( -- withdrawn -- )
- Forward-Secure Hierarchical ID-Based Cryptography
- Danfeng Yao and Anna Lysyanskaya
-
2003/148 ( PS PS.GZ PDF )
- A Tweakable Enciphering Mode
- Shai Halevi and Phillip Rogaway
-
2003/147 ( PS PS.GZ PDF )
- A Parallelizable Enciphering Mode
- Shai Halevi and Phillip Rogaway
-
2003/146 ( PS PS.GZ PDF )
- Breaking and Repairing Optimistic Fair Exchange from PODC 2003
- Yevgeniy Dodis and Leonid Reyzin
-
2003/145 ( PS PS.GZ )
- Symmetric Authentication Within a Simulatable Cryptographic Library
- Michael Backes and Birgit Pfitzmann and Michael Waidner
-
2003/144 ( PS PS.GZ PDF )
- ID-based tripartite key agreement with signatures
- Divya Nalla
-
2003/143 ( PS PS.GZ PDF )
- Elliptic curves suitable for pairing based cryptography
- Friederike Brezing and Annegret Weng
-
2003/142 ( PS PS.GZ )
- A New Tree based Domain Extension of UOWHF
- Mridul Nandi
-
2003/141 ( PS PS.GZ PDF )
- General Composition and Universal Composability in Secure Multiparty Computation
- Yehuda Lindell
-
2003/140 ( PS PS.GZ PDF )
- Trading-Off Type-Inference Memory Complexity Against Communication
- Konstantin Hypp\"onen and David Naccache and Elena Trichina and Alexei Tchoulkine
-
2003/139 ( PDF )
- On the Randomness of the Editing Generator
- Enjian Bai and Guozhen Xiao
-
2003/138 ( PS PS.GZ )
- Permutation graphs, fast forward permutations, and
- Boaz Tsaban
-
2003/137 ( PS PS.GZ )
- Bernoulli numbers and the probability of a birthday surprise
- Boaz Tsaban
-
2003/136 ( PS PS.GZ )
- Efficient linear feedback shift registers with maximal period
- Boaz Tsaban and Uzi Vishne
-
2003/135 ( PS PS.GZ PDF )
- Collision Attack on Reduced-Round Camellia
- Wen-Ling Wu and Deng-Guo Feng
-
2003/134 ( -- withdrawn -- )
- Direct Sum of Non Normal and Normal Bent Functions Always Produces Non Normal Bent Functions
- Sugata Gangopadhyay and Subhamoy Maitra
-
2003/133 ( PS PS.GZ PDF )
- Minimum Distance between Bent and 1-resilient Boolean Functions
- Soumen Maity and Subhamoy Maitra
-
2003/132 ( PS PS.GZ )
- Guaranteeing the diversity of number generators
- Adi Shamir and Boaz Tsaban
-
2003/131 ( PS PS.GZ PDF )
- Homomorphic public-key systems based on subgroup membership problems
- Kristian Gjøsteen
-
2003/130 ( PS PS.GZ PDF )
- On the Pseudorandomness of KASUMI Type Permutations
- Tetsu Iwata and Tohru Yagi and Kaoru Kurosawa
-
2003/129 ( PS PS.GZ PDF )
- Attack on Han et al.'s ID-based Confirmer (Undeniable) Signature at ACM-EC'03
- Fangguo Zhang and Reihaneh Safavi-Naini and Willy Susilo
-
2003/128 ( PS PS.GZ )
- Weak Fields for ECC
- Alfred Menezes and Edlyn Teske and Annegret Weng
-
2003/127 ( PDF )
- Using Information Theory Approach to Randomness Testing
- B. Ya. Ryabko and V.A. Monarev
-
2003/126 ( PS PS.GZ PDF )
- Certificateless Public Key Cryptography
- Sattam S. Al-Riyami and Kenneth G. Paterson
-
2003/125 ( PS PS.GZ PDF )
- Algebraic Attacks on Combiners with Memory and Several Outputs
- Nicolas T. Courtois
-
2003/124 ( PS PS.GZ )
- A General Correlation Theorem
- Kishan Chand Gupta and Palash Sarkar
-
2003/123 ( PS PS.GZ PDF )
- Assessing security of some group based cryptosystems
- Vladimir Shpilrain
-
2003/122 ( PDF )
- Cryptanalysis of Al-Riyami-Paterson's Authenticated Three Party Key Agreement Protocols
- Kyungah Shim
-
2003/121 ( PS PS.GZ )
- A Cryptographically Sound Security Proof of the Needham-Schroeder-Lowe Public-Key Protocol
- Michael Backes and Birgit Pfitzmann
-
2003/120 ( PS PS.GZ PDF )
- Physically Observable Cryptography
- Silvio Micali and Leonid Reyzin
-
2003/119 ( PS PS.GZ PDF )
- How Secure Are FPGAs in Cryptographic Applications?
- Thomas Wollinger and Christof Paar
-
2003/118 ( PS PS.GZ )
- Visual Crypto Displays Enabling Secure Communications
- Pim Tuyls, Tom Kevenaar, Geert-Jan Schrijen, Toine Staring, Marten van Dijk
-
2003/117 ( PDF )
- An identity-based ring signature scheme from bilinear pairings
- Chih-Yin Lin and Tzong-Chen Wu
-
2003/116 ( PS PS.GZ PDF )
- A New ID-based Group Signature Scheme from Bilinear Pairings
- Xiaofeng Chen and Fangguo Zhang and Kwangjo Kim
-
2003/115 ( PDF )
- Cryptanalysis of ID-based Tripartite Authenticated Key Agreement Protocols
- Kyungah Shim
-
2003/114 ( PS PS.GZ )
- Unifying Simulatability Definitions in Cryptographic Systems under Different Timing Assumptions
- Michael Backes
-
2003/113 ( PS PS.GZ PDF )
- Security Analysis of Shim's Authenticated Key Agreement Protocols from Pairings
- Hung-Min Sun and Bin-Tsan Hsieh
-
2003/112 ( PS PS.GZ )
- Accumulating Composites and Improved Group Signing
- Gene Tsudik and Shouhuai Xu
-
2003/111 ( -- withdrawn -- )
- Further Cryptanalysis of some Proxy Signature Schemes
- Jiqiang Lv and Jingwei Liu and Xinmei Wang
-
2003/110 ( PDF )
- Proposal on Personal Authentication System in which Biological Information is embedded in Cryptosystem Key
- Yukio Itakura and Shigeo Tsujii
-
2003/109 ( PS PS.GZ PDF )
- Crytanalysis of SAFER++
- Alex Biryukov and Christophe De Canni\`ere and Gustaf Dellkrantz
-
2003/108 ( PS PS.GZ PDF )
- Novel Cyclic and Algebraic Properties of AES
- Tri Van Le
-
2003/107 ( PS PS.GZ PDF )
- Fujisaki-Okamoto IND-CCA hybrid encryption revisited
- David Galindo and Sebasti\`a Mart\'{\i}n and Paz Morillo and Jorge L. Villar
-
2003/106 ( PS PS.GZ PDF )
- CWC: A high-performance conventional authenticated encryption mode
- Tadayoshi Kohno and John Viega and Doug Whiting
-
2003/105 ( PS PS.GZ )
- On Diophantine Complexity and Statistical Zero-Knowledge Arguments
- Helger Lipmaa
-
2003/104 ( PS PS.GZ PDF )
- New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing
- Fangguo Zhang and Reihaneh Safavi-Naini and Chih-Yin Lin
-
2003/103 ( PS PS.GZ PDF )
- Security analysis on Nalla-Reddy's ID-based tripartite authenticated key agreement protocols
- Zhongliang Chen
-
2003/102 ( PDF )
- Length-Based Attacks for Certain Group Based Encryption Rewriting Systems
- J. Hughes, and A. Tannenbaum
-
2003/101 ( -- withdrawn -- )
- Cryptanalysis of HFE
- Ilia Toli
-
2003/100 ( PS PS.GZ PDF )
- Protocols for Bounded-Concurrent Secure Two-Party Computation in the Plain Model
- Yehuda Lindell
-
2003/099 ( PS PS.GZ PDF )
- Algorithms in Braid Groups
- Matthew J. Campagna
-
2003/098 ( PDF )
- Side Channel Attacks on CBC Encrypted Messages in the PKCS#7 Format
- Vlastimil Klima and Tomas Rosa
-
2003/097 ( PS PS.GZ PDF )
- Low Cost Security: Explicit Formulae for Genus 4 Hyperelliptic Curves
- Jan Pelzl and Thomas Wollinger and Christof Paar
-
2003/096 ( PDF )
- Secure Proxy Signature Schemes for Delegation of Signing Rights
- Alexandra Boldyreva and Adriana Palacio and Bogdan Warinschi
-
2003/095 ( PS PS.GZ PDF )
- Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
- Yevgeniy Dodis and Nelly Fazio
-
2003/094 ( PS PS.GZ PDF )
- Trace Zero Subvariety for Cryptosystems
- Tanja Lange
-
2003/093 ( PS PS.GZ PDF )
- Simple Stateless Steganography
- Leonid Reyzin and Scott Russell
-
2003/092 ( PS PS.GZ PDF )
- Provably-Secure Enhancement on 3GPP Authentication and Key Agreement Protocol
- Muxiang Zhang
-
2003/091 ( PS PS.GZ PDF )
- Sequential Aggregate Signatures from Trapdoor Permutations
- Anna Lysyanskaya and Silvio Micali and Leonid Reyzin and Hovav Shacham
-
2003/090 ( PDF )
- A Structured Multisignature Scheme from the Gap Diffie-Hellman Group
- Chih-Yin Lin and Tzong-Chen Wu and Fangguo Zhang
-
2003/089 ( PS PS.GZ PDF )
- Efficient Public Key Generation for Multivariate Cryptosystems
- Christopher Wolf
-
2003/088 ( PDF )
- Elliptic Curve Point Multiplication
- A.G.Rostovtsev and E.B.Makhovenko
-
2003/087 ( PS PS.GZ PDF )
- A Practical Elliptic Curve Public Key Encryption Scheme Provably Secure Against Adaptive Chosen-message Attack
- huafei zhu
-
2003/086 ( PS PS.GZ PDF )
- On the Selection of Pairing-Friendly Groups
- Paulo S. L. M. Barreto and Ben Lynn and Michael Scott
-
2003/085 ( PS PS.GZ )
- A defect of the implementation schemes of the TTM cryptosystem
- Jintai Ding, Dieter Schmidt
-
2003/084 ( PS PS.GZ )
- Cryptanalysis of an implementation scheme of the Tamed Transformation Method cryptosystem
- Jintai Ding, Timonthy Hodges
-
2003/083 ( PS PS.GZ PDF )
- A Forward-Secure Public-Key Encryption Scheme
- Ran Canetti and Shai Halevi and Jonathan Katz
-
2003/082 ( PS PS.GZ PDF )
- Stronger Security Bounds for OMAC, TMAC and XCBC
- Tetsu Iwata and Kaoru Kurosawa
-
2003/081 ( PDF )
- Primitive Specification for SOBER-128
- Philip Hawkes and Greg Rose
-
2003/080 ( PS PS.GZ PDF )
- Non-interactive and Reusable Non-malleable Commitment Schemes
- Ivan Damgård and Jens Groth
-
2003/079 ( PS PS.GZ PDF )
- Fast arithmetic on Jacobians of Picard curves
- Stéphane Flon and Roger Oyono
-
2003/078 ( PS PS.GZ PDF )
- Relation among simulator-based and comparison-based definitions of semantic security
- Yodai Watanabe and Junji Shikata
-
2003/077 ( PS PS.GZ PDF )
- An Uninstantiable Random-Oracle-Model Scheme for a Hybrid Encryption Problem
- Mihir Bellare and Alexandra Boldyreva and Adriana Palacio
-
2003/076 ( PS PS.GZ PDF )
- Goldbach’s Conjecture on ECDSA Protocols
- N. Vijayarangan, Nitin Agarwal, S. Kasilingam
-
2003/075 ( PS PS.GZ )
- Almost Security of Cryptographic Boolean Functions
- Kaoru Kurosawa
-
2003/074 ( PDF )
- Divisible Voting Scheme
- Natsuki Ishida and Shin'ichiro Matsuo and Wakaha Ogata
-
2003/073 ( PDF )
- A Scheme for obtaining a Warrant Message from the Digital Proxy Signatures
- Sunder Lal and Amit K Awasthi
-
2003/072 ( PDF )
- Proxy Blind Signature Scheme
- Amit K Awasthi and Sunder Lal
-
2003/071 ( PS PS.GZ PDF )
- How to Protect Against a Militant Spammer
- Markus Jakobsson and John Linn and Joy Algesheimer
-
2003/070 ( PS PS.GZ PDF )
- A Critique of CCM
- P. Rogaway and D. Wagner
-
2003/069 ( PS PS.GZ )
- EAX: A Conventional Authenticated-Encryption Mode
- M. Bellare and P. Rogaway and D. Wagner
-
2003/068 ( PS PS.GZ PDF )
- On the Security of Some Proxy Signature Schemes
- Hung-Min Sun and Bin-Tsan Hsieh
-
2003/067 ( PS PS.GZ PDF )
- Forking Lemmas in the Ring Signatures' Scenario
- Javier Herranz and Germ\'an S\'aez
-
2003/066 ( PS PS.GZ PDF )
- Signcryption scheme for Identity-based Cryptosystems
- Divya Nalla, K.C.Reddy
-
2003/065 ( PS PS.GZ PDF )
- Hash Function Balance and its Impact on Birthday Attacks
- Mihir Bellare and Tadayoshi Kohno
-
2003/064 ( PS PS.GZ PDF )
- On the Optimality of Linear, Differential and Sequential Distinguishers
- Pascal Junod
-
2003/063 ( PS PS.GZ PDF )
- Initiator-Resilient Universally Composable Key Exchange
- Dennis Hofheinz and Joern Mueller-Quade and Rainer Steinwandt
-
2003/062 ( PS PS.GZ )
- Extending Joux's Protocol to Multi Party Key Agreement
- Rana Barua and Ratna Dutta and Palash Sarkar
-
2003/061 ( PDF )
- Hidden Polynomial Cryptosystems
- Ilia Toli
-
2003/060 ( PS PS.GZ PDF )
- Isomorphism Classes of Picard Curves over Finite Fields
- Jong Won Lee
-
2003/059 ( -- withdrawn -- )
- A Transitive Signature Scheme Provably Secure Against Adaptive Chosen-message Attack
- Huafei Zhu and Bao Feng and Robert H. Deng
-
2003/058 ( PS PS.GZ PDF )
- An Elliptic Curve Trapdoor System
- Edlyn Teske
-
2003/057 ( PS PS.GZ )
- Secure Multiplication of Shared Secrets in the Exponent
- Mario Di Raimondo and Rosario Gennaro
-
2003/056 ( PS PS.GZ PDF )
- Computing of Trust in Distributed Networks
- Huafei Zhu and Bao Feng and Robert H. Deng
-
2003/055 ( PDF )
- A New Approach to Prevent Blackmailing in E-Cash
- Xiaofeng Chen and Fangguo Zhang and Yumin Wang
-
2003/054 ( PS PS.GZ PDF )
- ID based Cryptosystems with Pairing on Elliptic Curve
- Ryuichi SAKAI and Masao KASAHARA
-
2003/053 ( PS PS.GZ )
- Tate-pairing implementations for tripartite key agreement
- Iwan Duursma and Hyang-Sook Lee
-
2003/052 ( PDF )
- Attacking RSA-based Sessions in SSL/TLS
- Vlastimil Klima and Ondrej Pokorny and Tomas Rosa
-
2003/051 ( PS PS.GZ )
- How to Predict the Output of a Hardware Random Number Generator
- Markus Dichtl
-
2003/050 ( PS PS.GZ PDF )
- Concealment and its Applications to Authenticated Encryption
- Yevgeniy Dodis and Jee Hea An
-
2003/049 ( PS PS.GZ PDF )
- Hidden Number Problem in Small Subgroups
- Igor Shparlinski and Arne Winterhof
-
2003/048 ( PS PS.GZ PDF )
- Compounding Secret Sharing Schemes
- E. Martinez-Moro, J. Mozo-Fernandez, C. Munuera
-
2003/047 ( PS PS.GZ PDF )
- A Construction of 100 bit Public-Key Cryptosystem and Digital Signature Scheme
- Masao KASAHARA and Ryuichi SAKAI
-
2003/046 ( PS PS.GZ PDF )
- Remarks on Saeednia's Identity-based Society Oriented Signature Scheme with Anonymous Signers
- Guilin Wang, and Bo Zhu
-
2003/045 ( PDF )
- An algorithm to obtain an RSA modulus with a large private key
- L. Hern\'{a}ndez Encinas and J. Mu\~{n}oz Masqu\'{e} and A. Queiruga Dios
-
2003/044 ( -- withdrawn -- )
- Signcryption scheme for Identity-based Cryptosystems
- Divya Nalla, K.C.Reddy
-
2003/043 ( -- withdrawn -- )
- Parallel Signcryption with OAEP, PSS-R, and other Feistel Paddings
- Yevgeniy Dodis and Michael J. Freedman and Shabsi Walfish
-
2003/042 ( PS PS.GZ )
- Timed Fair Exchange of Standard Signatures
- Juan A. Garay and Carl Pomerance
-
2003/041 ( PS PS.GZ )
- A new statistical distinguisher for the shrinking generator
- Jovan Dj. Golic and Renato Menicocci
-
2003/040 ( PS PS.GZ )
- Computing Partial Walsh Transform from the Algebraic Normal Form of a Boolean Function
- Kishan Chand Gupta and Palash Sarkar
-
2003/039 ( PS PS.GZ PDF )
- Torus-based cryptography
- Karl Rubin and Alice Silverberg
-
2003/038 ( PS PS.GZ PDF )
- Pretty-Simple Password-Authenticated Key-Exchange Under Standard Assumptions
- Kazukuni Kobara and Hideki Imai
-
2003/037 ( PS PS.GZ PDF )
- Strengthening Zero-Knowledge Protocols using Signatures
- Juan A. Garay and Philip MacKenzie and Ke Yang
-
2003/036 ( PS PS.GZ PDF )
- Cryptanalysis of a public-key encryption scheme based on the polynomial reconstruction problem
- Jean-Sebastien Coron
-
2003/035 ( PDF )
- On alternative approach for verifiable secret sharing
- Kamil Kulesza and Zbigniew Kotulski and Josef Pieprzyk
-
2003/034 ( PS PS.GZ PDF )
- On the (In)security of the Fiat-Shamir Paradigm
- Shafi Goldwasser and Yael Tauman
-
2003/033 ( PDF )
- Integral Cryptanalysis on reduced-round Safer++
- Gilles Piret and Jean-Jacques Quisquater
-
2003/032 ( PS PS.GZ )
- A Framework for Password-Based Authenticated Key Exchange
- Rosario Gennaro and Yehuda Lindell
-
2003/031 ( PS PS.GZ PDF )
- Cryptographic Tamper Evidence
- Gene Itkis
-
2003/030 ( PS PS.GZ PDF )
- Efficient Multi-Party Computation over Rings
- Ronald Cramer and Serge Fehr and Yuval Ishai and Eyal Kushilevitz
-
2003/029 ( -- withdrawn -- )
- Universal Padding Schemes for RSA with Optimal Bandwidth of Message Recovery
- Wenbo Mao and John Malone-Lee
-
2003/028 ( PS PS.GZ PDF )
- Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults
- Mathieu Ciet and Marc Joye
-
2003/027 ( PS PS.GZ )
- Cryptographic Randomized Response Techniques
- Andris Ambainis and Markus Jakobsson and Helger Lipmaa
-
2003/026 ( PS PS.GZ PDF )
- Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves (Update)
- Jan Pelzl and Thomas Wollinger and Jorge Guajardo and Christof Paar
-
2003/025 ( PS PS.GZ )
- Homomorphic public-key cryptosystems and encrypting boolean circuits
- D.Grigoriev. I.Ponomarenko
-
2003/024 ( PS PS.GZ PDF )
- On Modeling IND-CCA Security in Cryptographic Protocols
- Dennis Hofheinz and Joern Mueller-Quade and Rainer Steinwandt
-
2003/023 ( PS PS.GZ PDF )
- New identity based signcryption schemes from pairings
- Benoît Libert and Jean-Jacques Quisquater
-
2003/022 ( PS PS.GZ PDF )
- Did Filiol Break AES ?
- Nicolas T. Courtois and Robert T. Johnson and Pascal Junod and Thomas Pornin and Michael Scott
-
2003/021 ( PS PS.GZ )
- Interleaving Cryptography and Mechanism Design: The Case of Online Auctions
- Edith Elkind and Helger Lipmaa
-
2003/020 ( PS PS.GZ PDF )
- Attacks based on Conditional Correlations against the Nonlinear Filter Generator
- Bernhard L\"ohlein
-
2003/019 ( PS PS.GZ PDF )
- A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problem
- Jung Hee Cheon and Byungheup Jun
-
2003/018 ( PS PS.GZ PDF )
- An Authenticated Group Key Agreement Protocol on Braid groups
- HO-KYU LEE, HYANG-SOOK LEE, YOUNG-RAN LEE
-
2003/017 ( PS PS.GZ )
- Perfect Hash Families with Few Functions
- Simon R. Blackburn
-
2003/016 ( PS PS.GZ PDF )
- A Threshold GQ Signature Scheme
- Cheng-Kang Chu and Li-Shan Liu and Wen-Guey Tzeng
-
2003/015 ( PS PS.GZ PDF )
- A Universally Composable Cryptographic Library
- Michael Backes and Birgit Pfitzmann and Michael Waidner
-
2003/014 ( PS PS.GZ )
- Hiji-bij-bij: A New Stream Cipher with a Self-Synchronizing Mode of Operation
- Palash Sarkar
-
2003/013 ( PS PS.GZ PDF )
- Security Constraints on the Oswald-Aigner Exponentiation Algorithm
- Colin D. Walter
-
2003/012 ( PS PS.GZ PDF )
- The number of initial states of the RC4 cipher with the same cycle structure
- Marina Pudovkina
-
2003/011 ( PS PS.GZ PDF )
- Cryptanalysis of Lee-Hwang-Li's Key Authentication Scheme
- Fangguo Zhang and Kwangjo Kim
-
2003/010 ( PDF )
- Differential Fault Analysis on A.E.S.
- P. Dusart, G. Letourneux and O. Vivolo
-
2003/009 ( PS PS.GZ )
- Domain Extenders for UOWHF: A Finite Binary Tree Algorithm
- Palash Sarkar
-
2003/008 ( PS PS.GZ )
- DFA on AES
- Christophe Giraud
-
2003/007 ( -- withdrawn -- )
- A Price Negotiable Transaction System
- Huafei Zhu
-
2003/006 ( PS PS.GZ PDF )
- Multi-Party Computation from any Linear Secret Sharing Scheme Secure against Adaptive Adversary: The Zero-Error Case
- Ventzislav Nikov, Svetla Nikova, Bart Preneel
-
2003/005 ( PS PS.GZ PDF )
- Distributing the Encryption and Decryption of a Block Cipher
- Keith M. Martin, Rei Safavi-Naini, Huaxiong Wang and Peter R. Wild
-
2003/004 ( PS PS.GZ PDF )
- ID-based tripartite Authenticated Key Agreement Protocols from pairings
- Divya Nalla, and K.C.Reddy
-
2003/003 ( PS PS.GZ )
- Plaintext-dependant Repetition Codes Cryptanalysis of Block Ciphers - The AES Case
- Eric FILIOL
-
2003/002 ( PS PS.GZ PDF )
- Imperfect Decryption and an Attack on the NTRU Encryption Scheme
- John Proos
-
2003/001 ( PDF )
- A Mode of Operation with Partial Encryption and Message Integrity
- Philip Hawkes and Gregory G. Rose
[ Cryptology ePrint archive ]